Security system using RSA algorithm and method thereof
a security system and algorithm technology, applied in the field of security system using, can solve the problems of inability to challenge a side channel attack that is different from the conventional hacking method, the security of personal information is compromised, and the current smart card is very susceptible to being hacked
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
Reference will now be made in detail to the embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the like elements throughout. The embodiments are described below to explain the present invention by referring to the figures.
FIG. 3 is a block diagram illustrating the construction of a security system according to an aspect of the invention. As shown in FIG. 3, the security system includes a message input section 200, a key input section 300, and a control section 100. The control section 100 includes a random coefficient generating section 110, a first calculation section 120, a second calculation section 130, and a output section 140.
As described above, in the RSA algorithm, there are two encryption methods, a first method of transmitting a message by using a secret key and checking the message by using a public key, and a second method of transmitting a message by using a public key and ch...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


